Cybersecurity Today

Jim Love
undefined
Sep 6, 2025 • 32min

From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today

Nahman Khayet, an Israeli researcher known for automating exploit creation with AI, shares groundbreaking insights into the evolving landscape of cybersecurity. He reveals how his method slashes exploit development time from 192 days to just 15 minutes, raising alarms about the future of digital security. The conversation dives into the importance of the CVE Database and emphasizes the necessity for organizations to bolster their defenses against quicker, AI-driven threats. Khayet also discusses the dual challenge of fast coding and maintaining secure practices.
undefined
Sep 5, 2025 • 1min

Reminder of this week's schedule and preview of Weekend Edition.

This week features a schedule update, highlighting a shift to a shorter format. Excitement builds for an upcoming interview with researchers who have developed a method to turn CVEs into working exploits in just 15 minutes and for under a dollar using AI. This groundbreaking approach raises intriguing questions about the future of cybersecurity.
undefined
Sep 4, 2025 • 12min

Cloudflare Fends Off A Record Breaking 11.5 Tbps DDoS Attack

Cloudflare successfully thwarted a staggering 11.5 Tbps DDoS attack, showcasing the escalating challenges in digital defense. A concerning zero-click exploit affecting Apple users was patched by WhatsApp, urging high-risk individuals to take precautions. Supermarket refrigeration systems were highlighted for having critical vulnerabilities that could jeopardize food safety. Exposed Ollama AI servers raised alarms over self-hosted AI security risks. Meanwhile, a hacker group targeted Google, and Palo Alto Networks faced a supply chain breach involving stolen OAuth tokens.
undefined
Sep 2, 2025 • 11min

1,000 Developers Compromised By NX Build System Breach

A significant cybersecurity breach has affected over 1,000 developers via the NX build system, raising alarm bells in the tech community. The podcast discusses the vulnerabilities in Sitecore's platform and the troubling rise of data theft attacks on Salesforce. It highlights the evolving threats posed by AI in development, emphasizing the need for enhanced security practices. Listeners are urged to prioritize patching systems and educating teams to combat these sophisticated attacks from nation-state actors and criminal groups.
undefined
Aug 30, 2025 • 1h 8min

Cybersecurity Today: Month In Review Panel for August 2025

Tammy Harper, a senior threat intelligence researcher at Flair, and Laura Payne, a consultant at White Toque, delve into the evolving landscape of cybersecurity. They discuss the rise of AI-generated ransomware and its implications on security protocols. The duo highlights the urgent need for updated legislation to manage new challenges and the risks associated with offensive cyber operations. They also touch on the concerning relationship between youth unemployment and evolving cyber threats, stressing the importance of education in this rapidly changing environment.
undefined
Aug 29, 2025 • 10min

Zipline Phishing, Google Urges Password Resets, and AI-Driven Threats: Cybersecurity Today

In this episode of Cybersecurity Today, host Jim Love delves into the latest cyber threats and risks. Key topics include the new phishing campaign Zipline that flips traditional tactics, Google's call for 2.5 billion Gmail users to reset passwords due to a phishing attack by Shiny Hunters, and the emergence of AI-driven ransomware like Prompt Lock. The episode also covers a hijack of the NX build platform leading to a sophisticated supply chain attack, and a whistleblower's claims that the Social Security Administration put personal data at risk by improperly handling sensitive information. Tune in to stay informed on these evolving cyber threats and defensive measures. 00:00 Introduction to Cybersecurity News 00:31 Zipline Phishing: A New Threat 02:14 Google Urges Password Resets 03:51 AI-Powered Ransomware: Prompt Lock 05:48 NX Supply Chain Attack 07:35 Social Security Data at Risk 09:20 Conclusion and Upcoming Shows
undefined
Aug 27, 2025 • 11min

A Simple Phrase Defeats GPT5 Security

In this episode of Cybersecurity Today, host Jim Love discusses recent developments in cybersecurity, including a method to bypass GPT5 model safeguards, malware issues in the Google Play Store, NIST's new AI-specific security controls, and a cyber attack that led to a government shutdown in Nevada. The episode also covers a CRM-related breach linked to the Shiny Hunters collective, who used OAuth tokens to gain unauthorized access. Key takeaways emphasize the need for stronger security frameworks and vigilance against evolving cyber threats. 00:00 Introduction and Overview 00:27 Exploiting GPT-5: A Simple Prompt Attack 02:20 Google Play Store's Malware Struggles 04:11 NIST's New AI Security Controls 06:06 Nevada Government Cyber Attack 08:23 Shiny Hunters' CRM Breach 10:41 Conclusion and Contact Information
undefined
Aug 25, 2025 • 8min

From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today

Host David Shipley explores the latest in cybersecurity, including the rapid development of AI-generated exploits for critical vulnerabilities, record-high searches of digital devices at US borders, and a fired developer jailed for sabotaging his former employer. Additionally, the episode highlights Interpol's Operation Serengeti 2.0, which led to significant arrests and recoveries in the fight against cybercrime in Africa. The episode underscores the speed at which cyber threats can materialize and the importance of global and collaborative defenses. 00:00 Introduction to Cybersecurity Today 00:35 AI-Driven Exploits: A New Era of Cyber Threats 02:48 Record Device Searches at US Borders 04:43 Insider Threats: The Hidden Dangers Within Organizations 06:25 Operation Serengeti 2.0: A Major Blow to Cyber Crime 07:27 Conclusion and Final Thoughts
undefined
Aug 23, 2025 • 1h 23min

The Evolving Landscape of Cybersecurity Training: Effective Strategies and Misleading Headlines

In this episode of Cybersecurity Today, host Jim Love explores the complex dynamics of cybersecurity training with guests Michael Joyce and David Shipley. They discuss the importance of continuous awareness and the temporal decay of training effects. The conversation highlights the critical balance between training frequency and effectiveness, with data suggesting that monthly phishing simulations and quarterly training interventions offer optimal results. Despite recent headlines claiming phishing training is ineffective, the discussion underscores the nuanced understanding required to navigate cybersecurity education. The episode also delves into academic versus business perspectives, emphasizing the importance of empirical research and critical thinking in developing effective cybersecurity strategies. 00:00 Understanding Human Vigilance and Awareness Decay 00:33 Introduction to Cybersecurity Today 00:46 Meet the Experts: Michael Joyce and David Shipley 01:39 Exploring the Human-Centric Cybersecurity Partnership 03:38 The Role of Liberal Arts in Cybersecurity 04:23 Challenges in Cybersecurity: Technology vs. Human Behavior 06:34 The Importance of Independent Research in Cybersecurity 12:30 Analyzing Cybersecurity Awareness Month 18:32 Phishing Simulations and Security Fatigue 23:14 The Impact of Training on Phishing Awareness 39:38 Experimenting with Phishing Training Frequency 39:51 Critiques and Insights on Cybersecurity Training 41:51 Optimal Training Intervals and Their Impact 43:23 The Role of Awareness in Cybersecurity 44:13 Understanding Phishing Reporting and Skills Decay 45:22 Ethical Considerations in Phishing Simulations 46:38 New Data on Why People Click Phishing Links 55:52 The Importance of Psychological Safety 57:23 Debunking Misleading Headlines on Phishing Training 01:05:44 The Complexity of Cybersecurity Research 01:16:41 Final Thoughts and Recommendations
undefined
Aug 22, 2025 • 9min

Cybersecurity Today: Massive Data Exposures, Microsoft Failures, and PayPal Breach Claims

In this episode of Cybersecurity Today, host Jim Love covers a range of recent cybersecurity incidents. A major privacy failure has hit Elon Musk's Grok chatbot, exposing over 370,000 private conversations with sensitive information. Microsoft's recent security update has caused SSD and HDD failures, complicating data recovery. Hackers have exploited Microsoft's own login infrastructure to create phishing traps, making it difficult for users to spot fake login pages. The leader of the Wrapper Bot DDoS gang has been arrested following a detailed investigation. Finally, a hacker group claims to have 15.8 million PayPal credentials, although these claims are disputed by PayPal and security researchers. Jim also invites listeners to share their thoughts and comments through various contact methods. 00:00 Agro Leak Exposes 370,000 Chats 02:22 Microsoft Scrambles to Fix SSD Failures 03:52 Hackers Hijack Microsoft Infrastructure 05:40 Leader of Wrapper Bot DDoS Gang Arrested 07:14 Hackers Claim 15.8 Million PayPal Logins Stolen 08:34 Conclusion and Contact Information

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app